Security Analysis of an Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC
Recently, Esfahani, Mantas, and Rodriguez proposed a homomorphic message authentication code (MAC) scheme for the random linear network coding (RLNC) to resist tag pollution attacks (TPAs), and also presented the security analysis. As Esfahani et al. said, their scheme is based on the null space pro...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8753646/ |
_version_ | 1819174437019189248 |
---|---|
author | Jinyong Chang Bilin Shao Anling Zhang Genqing Bian Yanyan Ji Maozhi Xu |
author_facet | Jinyong Chang Bilin Shao Anling Zhang Genqing Bian Yanyan Ji Maozhi Xu |
author_sort | Jinyong Chang |
collection | DOAJ |
description | Recently, Esfahani, Mantas, and Rodriguez proposed a homomorphic message authentication code (MAC) scheme for the random linear network coding (RLNC) to resist tag pollution attacks (TPAs), and also presented the security analysis. As Esfahani et al. said, their scheme is based on the null space properties of Kehdi and Li, and the main contribution lies in adding the process of swapping when generating the tags for data packets. However, in this paper, we first point out that Esfahani et al.'s swapping technique is not essential for the TPA security, because the underlying non-swapping homomorphic MAC scheme has been secure against TPA and the process of swapping only improves the TPA security with a non-negligible factor. More importantly, we find that the security proof of Esfahani et al. is incorrect and misguided. In particular, according to Esfahani et al. suggestion, one should enlarge the number of neighbor nodes to reduce the probability of the TPA. However, this paper gives contrary suggestions in Esfahani et al.'s work by presenting the precise proof for the proposed homomorphic MAC scheme. |
first_indexed | 2024-12-22T20:38:57Z |
format | Article |
id | doaj.art-7107b31f66554689be9fb162229d8469 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-22T20:38:57Z |
publishDate | 2019-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-7107b31f66554689be9fb162229d84692022-12-21T18:13:23ZengIEEEIEEE Access2169-35362019-01-017883938839810.1109/ACCESS.2019.29264018753646Security Analysis of an Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNCJinyong Chang0https://orcid.org/0000-0002-6569-5152Bilin Shao1Anling Zhang2Genqing Bian3Yanyan Ji4Maozhi Xu5School of Information and Control Engineering, Xi’an University of Architecture and Technology, Xi’an, ChinaSchool of Management, Xi’an University of Architecture and Technology, Xi’an, ChinaDepartment of Mathematics, Changzhi University, Changzhi, ChinaSchool of Information and Control Engineering, Xi’an University of Architecture and Technology, Xi’an, ChinaSchool of Management, Xi’an University of Architecture and Technology, Xi’an, ChinaSchool of Mathematical Sciences, Peking University, Beijing, ChinaRecently, Esfahani, Mantas, and Rodriguez proposed a homomorphic message authentication code (MAC) scheme for the random linear network coding (RLNC) to resist tag pollution attacks (TPAs), and also presented the security analysis. As Esfahani et al. said, their scheme is based on the null space properties of Kehdi and Li, and the main contribution lies in adding the process of swapping when generating the tags for data packets. However, in this paper, we first point out that Esfahani et al.'s swapping technique is not essential for the TPA security, because the underlying non-swapping homomorphic MAC scheme has been secure against TPA and the process of swapping only improves the TPA security with a non-negligible factor. More importantly, we find that the security proof of Esfahani et al. is incorrect and misguided. In particular, according to Esfahani et al. suggestion, one should enlarge the number of neighbor nodes to reduce the probability of the TPA. However, this paper gives contrary suggestions in Esfahani et al.'s work by presenting the precise proof for the proposed homomorphic MAC scheme.https://ieeexplore.ieee.org/document/8753646/Homomorphic MACnetwork codingtag pollution attack (TPA) |
spellingShingle | Jinyong Chang Bilin Shao Anling Zhang Genqing Bian Yanyan Ji Maozhi Xu Security Analysis of an Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC IEEE Access Homomorphic MAC network coding tag pollution attack (TPA) |
title | Security Analysis of an Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC |
title_full | Security Analysis of an Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC |
title_fullStr | Security Analysis of an Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC |
title_full_unstemmed | Security Analysis of an Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC |
title_short | Security Analysis of an Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC |
title_sort | security analysis of an efficient null space based homomorphic mac scheme against tag pollution attacks in rlnc |
topic | Homomorphic MAC network coding tag pollution attack (TPA) |
url | https://ieeexplore.ieee.org/document/8753646/ |
work_keys_str_mv | AT jinyongchang securityanalysisofanefficientnullspacebasedhomomorphicmacschemeagainsttagpollutionattacksinrlnc AT bilinshao securityanalysisofanefficientnullspacebasedhomomorphicmacschemeagainsttagpollutionattacksinrlnc AT anlingzhang securityanalysisofanefficientnullspacebasedhomomorphicmacschemeagainsttagpollutionattacksinrlnc AT genqingbian securityanalysisofanefficientnullspacebasedhomomorphicmacschemeagainsttagpollutionattacksinrlnc AT yanyanji securityanalysisofanefficientnullspacebasedhomomorphicmacschemeagainsttagpollutionattacksinrlnc AT maozhixu securityanalysisofanefficientnullspacebasedhomomorphicmacschemeagainsttagpollutionattacksinrlnc |